Research on neuromorphic computing is driven by the vision that we can emulate brain-like computing capability, learning capability, and energy-efficiency in novel hardware. Unfortunately, this vision has so far been ...
详细信息
Research on neuromorphic computing is driven by the vision that we can emulate brain-like computing capability, learning capability, and energy-efficiency in novel hardware. Unfortunately, this vision has so far been pursued in a half-hearted manner. Most current neuromorphic hardware (NMHW) employs brain-like spiking neurons instead of standard artificial neurons.
It is not easy to reduce the metal artifacts of computed tomography images. However, the pixel values inside the metal artifact regions vary smoothly, while those on the borders of the metal and the bone regions vary ...
详细信息
Integrating Large Language Models (LLMs) with Knowledge Graphs (KGs) enhances the interpretability and performance of AI systems. This research comprehensively analyzes this integration, classifying approaches into th...
详细信息
Artificial neural networks are capable of machine learning by simulating the hiera rchical structure of the human *** enable learning by brain and machine,it is essential to accurately identify and correct the predict...
详细信息
Artificial neural networks are capable of machine learning by simulating the hiera rchical structure of the human *** enable learning by brain and machine,it is essential to accurately identify and correct the prediction errors,referred to as credit assignment(Lillicrap et al.,2020).It is critical to develop artificial intelligence by understanding how the brain deals with credit assignment in neuroscience.
Transcriptome-wide association studies (TWAS) goal is to better understand the etiology of diseases and develop preventative and therapeutic approaches by examining the connections between genetic variants and phenoty...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new *** proposed chaos system achieves three positive Lyapunov *** results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.
Skin cancer presents in various forms, including squamous cell carcinoma (SCC), basal cell carcinoma (BCC), and melanoma. Established risk factors include ultraviolet (UV) radiation exposure from solar or artificial s...
详细信息
Mass spectrometry (MS) serves as a powerful analytical technique in metabolomics. Traditional MS analysis workflows are heavily reliant on operator experience and are prone to be influenced by complex, high-dimensiona...
详细信息
Foams improve mobility control in injection operations within geological ***,such as iron-oxide,have been shown to enhance the stability of foams when combined with *** this research,we leverage the magnetic propertie...
详细信息
Foams improve mobility control in injection operations within geological ***,such as iron-oxide,have been shown to enhance the stability of foams when combined with *** this research,we leverage the magnetic properties of these nanoparticles to detect their presence as a surrogate for monitoring the geologic extent of injected fluids in the *** feasibility of using these nanoparticles for monitoring purposes stems from their detectability at low concentrations in subsurface *** developed two distinct methods to detect the presence of magnetite nanoparticles in complex *** simulate complex subsurface fluids in a laboratory setting,we included various ions and surfactants and investigated their effects on the detection of *** this end,we designed an experimental setup and tested two magnetic detection methods:Induction Heating(IH)and Oscillator Frequency Shift(OFS).The IH method involves applying a high-frequency alternating magnetic field to a solution containing small amounts of magnetic nanoparticles and measuring the temperature *** built an experimental setup to generate this magnetic field for different samples,with temperature changes recorded by an infrared *** results indicate that nanoparticle concentrations linearly affect the solution's temperature ***,the presence of ions and surfactants also influences the temperature *** OFS method measures shifts in the resonance frequency of a circuit caused by changes in magnetic permeability inside a *** coil is part of a transistor oscillator circuit that produces a sinusoidal voltage waveform,with the oscillation frequency depending on the coil’s *** presence of nanoparticles causes a shift in resonance frequency,which were precisely measured for various *** drop in resonance frequency is a linear function of nanoparticle concentration,and both methods detect concentrations as low as 15
作者:
Chen, Sung-YuChang, Chi-MinChiang, Kuan-JungWei, Chun-Shu
Department of Computer Science Hsinchu30010 Taiwan Arctop Inc.
La Jolla CA92093 United States
Department of Computer Science The Institute of Education The Institute of Biomedical Engineering Hsinchu30010 Taiwan
Steady-state visual-evoked potential (SSVEP)-based brain-computer interfaces (BCIs) offer a non-invasive means of communication through high-speed speller systems. However, their efficiency is highly dependent on indi...
详细信息
暂无评论